Smali code injection4/4/2023 ![]() ![]() ![]() In addition, to prevent a tampered application from running, we propose a tampering detection scheme that uses a dynamic attestation platform. In this paper, we show that, using Dalvik monitor, protection methods at the managed code level can be dynamically analyzed. However, through dynamic analysis, protection methods at the managed code can be rendered ineffective, and there is a need for a protection method that will address this. To protect against such repackaging attacks, obfuscation methods and tampering detection schemes to prevent application analysis are being developed and applied to Android applications. The attacker injects into the original application illegal advertisement or malicious code that extracts personal information, and then redistributes the app. A repackaging attack is a method of attack, where an attacker with malicious intent alters an application distributed on the market to then redistribute it. The Android platform, with a large market share from its inclusive openness, faces a big problem with repackaging attacks, because reverse engineering is made easy due to the signature method that allows self-sign and also due to application structure. ![]()
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |